• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: 사이버보안 ]" (10)
  1. 1. A Research for the Composition of K-RMF System Security Plan Applied Research and Development Project
    Suk Ho Seo, Eun Jin Choi, Seungil Noh, Hyeon Ho Lee, Vol. 27, No. 1, pp. 147-155, Feb. 2026
    10.7472/jksii.2026.27.1.147
    Keywords: K-RMF, System security plan, Research and Development, Cyber Security, Weapon System
  2. 2. A Data-Driven Study on Deriving Core Provisions for the Enactment of the Seoul Metropolitan Government Cybersecurity Ordinance
    Jiyeong Lee, Dohyun Kim, Vol. 26, No. 6, pp. 171-182, Dec. 2025
    10.7472/jksii.2025.26.6.171
    Keywords: cybersecurity, Research on Ordinance Legislation, Data-Driven Analysis, Derivation of core Provisions
  3. 3. A Survey of Semi-Supervised Learning in Cybersecurity: Methods, Domains, and Guidelines for Fair Evaluation
    Suchul Lee, Vol. 26, No. 6, pp. 1-12, Dec. 2025
    10.7472/jksii.2025.26.6.1
    Keywords: Semi-supervised learning, cybersecurity, Pseudo-labeling, Consistency regularization
  4. 4. Cybersecurity Job Market Analysis Using Online Recruitment Information
    Da-in Choi, Moohong Min, Vol. 26, No. 3, pp. 99-109, Jun. 2025
    10.7472/jksii.2025.26.3.99
    Keywords: cybersecurity, Cybersecurity Workforce, Job Analysis, Unsupervised learning, topic modeling
  5. 5. A Study of Overlay for Security Controls of K-RMF on Space System
    Sukjoon Yoon, Cheol-gyu Yi, Jiwon Kang, Vol. 26, No. 1, pp. 211-220, Feb. 2025
    10.7472/jksii.2025.26.1.211
    Keywords: Space system, Cyber Security, K-RMF, Space Overlays, security controls
  6. 6. A Research on the Method of Writing a Security Plan for K-RMF Applied Research and Development Projects
    Won-Young Lee, Vol. 25, No. 6, pp. 61-69, Dec. 2024
    10.7472/jksii.2024.25.6.61
    Keywords: K-RMF, RMF, Security plan, Weapon system security plan, Cyber Security
  7. 7. Proposal for the『Army TIGER Cyber Defense System』Installation capable of responding to future enemy cyber attack
    Byeong-jun Park, Cheol-jung Kim, Vol. 25, No. 1, pp. 157-166, Feb. 2024
    10.7472/jksii.2024.25.1.157
    Keywords: Army TIGER, Drone, robot, unmanned vehicle, AI, Cloud Center, Cyber Defense
  8. 8. A study on the cyber common operation picture for situational awareness in cyberspace
  9. 9. The direction of application of the RMF-based risk management system considering interoperability
    Hyuk-Jin Kwon, Sung-Tae Kim, Ye-na Joo, Vol. 22, No. 6, pp. 83-89, Dec. 2021
    10.7472/jksii.2021.22.6.83
    Keywords: CyberSecurity System engineering, Fuzzy, Secure SDLC, RMF
  10. 10. A study on the application of mission-based weapon system cybersecurity test and evaluation
    Ik-jae Kim, Ji-won Kang, Dong-kyoo Shin, Vol. 22, No. 6, pp. 71-81, Dec. 2021
    10.7472/jksii.2021.22.6.71
    Keywords: cybersecurity test and evaluation